--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:16:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7bbc3ca3-0f1a-44b2-a27d-6708a451e25c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:07Z" name: builder-dockercfg-fscrg namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7bbc3ca3-0f1a-44b2-a27d-6708a451e25c resourceVersion: "3602" uid: 4a20f002-f709-4fda-a8d4-45cf3e7469ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:16:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6446927e-d109-4981-bf75-74d87afc087e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:02Z" name: default-dockercfg-k2698 namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6446927e-d109-4981-bf75-74d87afc087e resourceVersion: "2780" uid: 1a5060b5-5d9e-4fd1-98cf-8a7bd008f0a4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:16:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"93e40abb-520f-469f-86f7-db1bfc7038bf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:07Z" name: deployer-dockercfg-cbj7q namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 93e40abb-520f-469f-86f7-db1bfc7038bf resourceVersion: "3603" uid: 19b87b9c-fa58-4b76-a9d0-988399a703c2 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ1ekNDQXMrZ0F3SUJBZ0lJRHNrdWM0Z1N2cUF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTBNamt3TlRBZQpGdzB5TmpBME1UY3hOakl4TlRCYUZ3MHlPREEwTVRZeE5qSXhOVEZhTUNneEpqQWtCZ05WQkFNVEhXUnVjeTFrClpXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXVjM1pqTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEEKTUlJQkNnS0NBUUVBeFpRellhOG1VdlVNT1RzVG5VTDRGa04zdkhGWnVMeTJ3aE9reU4xdG9CTlFsS2gzSTF0dQplaHJ2dXhYMFdRRk8zb0Yya3JyUWhyTWt1VTEyQjRiUWJNQ0dBdTBFR3Vmb01FSkh4Y1VLTGd5dDRSa2dwRDF5Cjg0V3NTeWdXSGtpZ3JOeWo4elppNjBqRnhIT0NtRC95UnJqZys5L0M3cUlFU3hPcVpWV3VPakp6S2lBZlhnc3AKQjJuby9TUUdJUzJKWm9sM2VaQVJ2SXB6M2N2ZkhzUk5TVnk0S0puR3B3cGpBbXhIUGxoUHhhZ094ZW1CL3NGSgprbnlyUDdaMmI3YXhaUE9iQVhRUFd6ODlLTUpQVmlrTHRIL0Yxank0U3g0M01IdnBYRDNKbWFOOXd3Y1Z5RGFJCm9ZOFU5b1ZLN0RHd3p4ZEVkTHd2UVdGcFluaXZOZ1FoN1FJREFRQUJvNElCQlRDQ0FRRXdEZ1lEVlIwUEFRSC8KQkFRREFnV2dNQk1HQTFVZEpRUU1NQW9HQ0NzR0FRVUZCd01CTUF3R0ExVWRFd0VCL3dRQ01BQXdIUVlEVlIwTwpCQllFRkJwY1VENk1aSnd5VXA1V1ZqbGhUaGVXRGJMMU1COEdBMVVkSXdRWU1CYUFGRVVpZmw0WUFjKzNXUUlPCm96TlhuT2tvenF3SU1GVUdBMVVkRVFST01FeUNIV1J1Y3kxa1pXWmhkV3gwTG05d1pXNXphR2xtZEMxa2JuTXUKYzNaamdpdGtibk10WkdWbVlYVnNkQzV2Y0dWdWMyaHBablF0Wkc1ekxuTjJZeTVqYkhWemRHVnlMbXh2WTJGcwpNRFVHQ3lzR0FRUUJrZ2dSWkFJQkJDWVRKR1kwTkRabFlUaGlMV1V4WldRdE5EWTNNQzFoTldNeExXSmtNV05tCllUUmxNakk1T0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQURZelV0c3k2QUhxZWhoeDd2RHRwTXlZL0FidVoKV3RudW1EV2FORXVrMlFjeDZNd01UWHdrN0ZUYmtyQmhmenY5dks2WkxKa1pWN2RNbDVHWm8wRmRUeHltR3lGSwprOVduTmtmdDB0UVVDRzRTZ09icXM1Tmx4d2Nza2pxZ0JxRTdyZlBldnhpMDdiVGRDYzZscnBkZGdrOUZoSERvCmxHRG1sZURabTRqSUNxd0pxYXBTcUpYOVI0eU50bnBCRnNHZzFGSENVM1BtbVlhYi9NNGVxa1BxZHdsSmRlTmoKNUdmSG5TZ2pHa3ZmQzF6c1RWbUUrV1lCVmNtK3ZOaHFjUHJWOTl6V0QwTnNvdVhOZDhCZG96bmdobVJjR25pWApZL0Q0akJGMVgzZGxWVHRIM0RIeWRnUWQyUXJJMGxqUy81a2tpbXE5dzl0eXQyMld1Y0cyS3FXdGd3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlFQmhOL3VpMU42Y3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRME1qa3dOVEFlCkZ3MHlOakEwTVRjeE5qSXhORFJhRncweU9EQTJNVFV4TmpJeE5EVmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBOREk1TURVd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDMGMxYVJGU29lNUVvOTVDL2pCTXRzNjdjYzc0VVJSVlNKClNhYVRzUEZEYjY2Y2FnNlhlcjJnaktkRFJlSitQa2JTc1ZxV0lqS1AxMVNTeWRlTk5zejdLeDhqQmpWeHRjVVYKSmVqbnd1UjgzMzZFNFBsRDlhU2Q3WURZODZiWFg5TUwxd0U0UFdqcGpiNU1Xa1RqMk5DdlV2OVI4NlBnNC9TUwprazg3bHZuUi92bERza3lzb2QycVllbUdIWDAzaW1vMlN1M2Z3enAyeGx6WUtIU1R2L21vaGxVODhXYVV0YmdXCmh0NmlmWStORGc3eVYvVU93MHF0RkdtNi8wNGhtdC9JSEZQZUdER25YZ0w3aHF0OVAxNG5VYnhrSVVQRFF0SUYKL2QwMFBPK0VkZE9POE85YXJKdnlFMyswS3JMMzFmTmU3cG9CbHluMEF5bUtDMzlLOTVDVEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUkZJbjVlCkdBSFB0MWtDRHFNelY1enBLTTZzQ0RBZkJnTlZIU01FR0RBV2dCUkZJbjVlR0FIUHQxa0NEcU16VjV6cEtNNnMKQ0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWNCcGk1NGg1Y3NsbUNGNVJBU0xvRzhLcnZsNG5RMDNWc3FEVwpTZFNpT1RyOFRSaXFrSlFybGlhdjI1dUs0Mld0c2pPUGNxSXFSL3phMHA1U2xtMnhtVThyQnB4WGhWVFV4d0pKCkt3MEdTTVgyd3JaTlg2bDFRaXdyU204dHMyVTYveTFFNldGeGY2aE82L2RmajlnMUd6OXBrT1YxbzFVVThnWWwKVDN3Z1Z3RHdnN3JrSnZYZnc2YzdaZkFFZ0hoNWVaMS9PajRIU1ZLR0J1QzRBaGpDVUVIYmJZVlhMY2drWjA4SQpmVHByanRyTlBaYTloN1dQK1ZzT0xlL1RlK1Y5WXNYbi81MGt4a1V6NThMb1BrSmZ3LzE0Z1R6NkxYWVNBNFZoCkplMHZhTjVUWWpkQXBiK25qZnJuZVh5OVFHcnpCZHREODN0emxJUmtNcjJWTU02dUVnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:21:51Z" service.beta.openshift.io/expiry: "2028-04-16T16:21:51Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: f446ea8b-e1ed-4670-a5c1-bd1cfa4e2298 creationTimestamp: "2026-04-17T16:21:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f446ea8b-e1ed-4670-a5c1-bd1cfa4e2298"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:21:52Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: f446ea8b-e1ed-4670-a5c1-bd1cfa4e2298 resourceVersion: "7641" uid: 9d7dffb2-f9df-4707-bee8-4631e40b22a2 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-17T16:16:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"40d86c4c-6209-42ab-a3d5-c0e2bf165731"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:02Z" name: dns-dockercfg-vgznp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 40d86c4c-6209-42ab-a3d5-c0e2bf165731 resourceVersion: "2783" uid: 85d85bc6-a456-45bf-918f-fdb77b543553 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-17T16:16:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f0210477-4221-4cbd-ab0e-e1dfd38c5049"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:02Z" name: node-resolver-dockercfg-vl8tq namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: f0210477-4221-4cbd-ab0e-e1dfd38c5049 resourceVersion: "2790" uid: 90d27b22-edcb-4ca1-a16b-2376088c4fb2 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41407"